CVE-2026-33689
Published: 17 April 2026
Description
xrdp is an open source RDP server. Versions through 0.10.5 have an out-of-bounds read vulnerability in the pre-authentication RDP message parsing logic. A remote, unauthenticated attacker can trigger this flaw by sending a specially crafted sequence of packets during the…
more
initial connection phase. This vulnerability results from insufficient validation of input buffer lengths before processing dynamic channel communication. Successful exploitation can lead to a denial-of-service (DoS) condition via a process crash or potential disclosure of sensitive information from the service's memory space. This issue has been fixed in version 0.10.6.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the out-of-bounds read by requiring validation of input buffer lengths in pre-authentication RDP message parsing before processing dynamic channel communications.
Ensures timely patching to xrdp version 0.10.6 or later, which fixes the insufficient input validation flaw.
Limits the denial-of-service impact from process crashes caused by specially crafted RDP packets during initial connections.
Security SummaryAI
CVE-2026-33689 is an out-of-bounds read vulnerability (CWE-125) in the pre-authentication RDP message parsing logic of xrdp, an open source RDP server. The flaw stems from insufficient validation of input buffer lengths before processing dynamic channel communication. It affects all versions of xrdp through 0.10.5.
A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted sequence of packets during the initial connection phase. Successful exploitation may result in a denial-of-service condition through a process crash or potential disclosure of sensitive information from the service's memory space. The issue carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H), highlighting its high severity due to network accessibility, low attack complexity, and impacts on both confidentiality and availability.
The vulnerability has been addressed in xrdp version 0.10.6, as detailed in the project's release notes and security advisory. Security practitioners should update to this version or later to mitigate the risk.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated exploitation causes process crash (DoS) via application vulnerability (T1499.004). Memory disclosure potential exists but too vague for specific technique mapping.